SigmaHQ/rules/network/net_high_dns_requests_rate.yml
2021-09-02 20:07:03 +02:00

36 lines
905 B
YAML

action: global
title: High DNS Requests Rate
status: experimental
description: High DNS requests amount from host per short period of time
author: Daniil Yugoslavskiy, oscd.community
date: 2019/10/24
modified: 2020/08/27
falsepositives:
- Legitimate high DNS requests rate to domain name which should be added to whitelist
level: medium
tags:
- attack.exfiltration
- attack.t1048 # an old one
- attack.t1048.003
- attack.command_and_control
- attack.t1071 # an old one
- attack.t1071.004
---
id: b4163085-4001-46a3-a79a-55d8bbbc7a3a
logsource:
category: dns
detection:
selection:
query: '*'
timeframe: 1m
condition: selection | count() by src_ip > 1000
---
id: 51186749-7415-46be-90e5-6914865c825a
logsource:
category: firewall
detection:
selection:
dst_port: 53
timeframe: 1m
condition: selection | count() by src_ip > 1000